US8375005B1 - Rapid restore - Google Patents
Rapid restore Download PDFInfo
- Publication number
- US8375005B1 US8375005B1 US11/731,931 US73193107A US8375005B1 US 8375005 B1 US8375005 B1 US 8375005B1 US 73193107 A US73193107 A US 73193107A US 8375005 B1 US8375005 B1 US 8375005B1
- Authority
- US
- United States
- Prior art keywords
- files
- file
- usage
- timeframe
- predicted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
- 238000000034 method Methods 0.000 claims abstract description 59
- 238000011084 recovery Methods 0.000 claims description 35
- 238000012913 prioritisation Methods 0.000 claims description 20
- 230000005540 biological transmission Effects 0.000 claims description 8
- 238000000611 regression analysis Methods 0.000 claims description 4
- 238000004590 computer program Methods 0.000 claims 1
- 238000004519 manufacturing process Methods 0.000 abstract description 2
- 230000008569 process Effects 0.000 description 20
- 230000010076 replication Effects 0.000 description 8
- 230000008859 change Effects 0.000 description 6
- 239000003795 chemical substances by application Substances 0.000 description 6
- 238000004458 analytical method Methods 0.000 description 4
- 238000013459 approach Methods 0.000 description 4
- 230000004048 modification Effects 0.000 description 4
- 238000012986 modification Methods 0.000 description 4
- 230000002123 temporal effect Effects 0.000 description 4
- 230000006870 function Effects 0.000 description 3
- 230000004075 alteration Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 230000000977 initiatory effect Effects 0.000 description 2
- 238000013519 translation Methods 0.000 description 2
- 230000003466 anti-cipated effect Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 230000002354 daily effect Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000003292 diminished effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000008030 elimination Effects 0.000 description 1
- 238000003379 elimination reaction Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000003203 everyday effect Effects 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 238000009499 grossing Methods 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
- 230000002441 reversible effect Effects 0.000 description 1
- 238000007619 statistical method Methods 0.000 description 1
- 239000004557 technical material Substances 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/13—File access structures, e.g. distributed indices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
Definitions
- This invention relates generally to backup, and more particularly to systems and methods for performing restore operations on backed up data.
- This invention relates to systems and methods for performing restore operations on backed up data.
- a system's or data's importance to an organization or user is often used as a determining factor in assigning the degree to which the data or systems are protected.
- Some forms of protection are as simple as keeping backup copies of systems and data (“backups”), while others make use of redundant systems with rapid failover capabilities to ensure functional continuity.
- backup systems that provide rapid or near instant functional recovery cost more than systems which provide slower recovery methods.
- recovery time for some users/data may take longer than the user would like. As undesirable as this may be for the user, the enterprise may not be willing to spend additional money on a faster recovery system.
- High bandwidth connections such as those made over a wired LAN may be as much as 100 megabits per second (Mbps), 1 gigabits per second (Gbps), or more. At these speeds recovery can be completed in hours or even minutes with the largest backup sets. The same is not true of lower bandwidth connections.
- Many remote offices and remote workers are connected to their headquarters via low-bandwidth connections, commonly 1 Mbps and 2 Mbps connections. At this low bandwidth, recovery of commonly sized hard disk drives can take more than a day and sometimes weeks.
- FIG. 1 is a diagram of an embodiment of a system in accordance with the invention.
- FIG. 2 is a flowchart illustrating a process for prioritizing and restoring data in some embodiments of the invention
- FIG. 3 is a flowchart illustrating a process for prioritizing according to file type and/or timestamps and restoring data in some embodiments of the invention
- FIG. 4 is a flowchart illustrating a process for prioritizing according to periodicity and restoring data in some embodiments of the invention
- FIG. 5 is a flowchart illustrating a process for executing a list-based prioritized restore in some embodiments of the invention
- FIG. 6 is a flowchart illustrating a process for executing a prioritized restore through reordering in some embodiments of the invention.
- FIG. 7 is a flowchart illustrating a process for executing a prioritized restore through translation in some embodiments of the invention.
- the present invention can be implemented in numerous ways, including as a process, an apparatus, a system, a device, a method, or a computer readable medium such as a computer readable storage medium or a computer network wherein program instructions are sent over optical or electronic communication links.
- these implementations, or any other form that the invention may take, may be referred to as techniques.
- the order of the steps of disclosed processes may be altered within the scope of the invention.
- Disclosed herein are a method and system to restore backed up data, in a manner that provides functional utility to a remote system as quickly as possible. Thus, rapid recovery of system/data utility will be facilitated.
- the principles described herein will be of particular benefit to remote offices connected to a main office through low bandwidth connections, but are beneficial to local systems connected via high bandwidth connections as well, such as in hierarchical storage management systems and local replication.
- files and data are used herein to refer to recovery objects, but it should be understood that the disclosure is not restricted to files. Rather, it applies equally to block level recovery and to any data objects used in a recovery process.
- FIG. 1 illustrates a configuration in which a backup and restore system 10 comprising a restore program could be used to restore backed up (backup) data.
- Backup server 20 communicates with system 50 over a network (e.g., a local area network, wide area network, etc.).
- System 50 may have a backup client executing on it, and may have storage systems 60 and/or 70 on which its data is stored.
- System 50 may send its backups to storage system 40 or storage system 30 attached to backup server 20 .
- backup data from storage system 40 or storage system 30 may be restored to storage system 60 or storage system 70 for use by the system 50 .
- An agent executing on system 12 may be used to scan the backup to determine prioritization of the files or data stored on storage system 30 or storage system 40 .
- the agent executing on system 14 may be used to scan the files or data on storage system 60 or 70 .
- the agent may execute on backup server 20 or system 50 .
- the agent may be used to capture information about usage of the files or data. It will be understood that the agent may execute on any of the systems shown or on other systems, and that more than one agent may be used. Various configurations are possible, and the principles disclosed herein are not limited to the embodiment disclosed.
- Typical backup systems restore data in arbitrary order, such as in the order the data appeared on the original target system, or in reverse order in which the data was backed up.
- replication systems may arbitrarily transmit data in the order that they appear on the source system.
- the majority of the files/data contained in the backup set (or set to be replicated) are often not immediately needed or important to the user or system.
- Data recovery is performed according to the arbitrary order of the data within the backup pool, without any sense of priority in relationship to user or application importance or urgency. This is typical of both file-based and image-based backup technologies.
- the backup process can be accelerated through the use of data de-duplication techniques (“RDE” redundant data elimination) and compression.
- RDE redundant data elimination
- compression During recovery of de-duplicated data, it is necessary to reconstitute the data and pass it through the low bandwidth connection.
- RDE techniques may be used for recovery as well, but they require the use of an RDE system on both sides of the connection, which may be impractical or out of project scope. Further, the benefit of de-duplication is diminished when data is encrypted or is of a sufficiently random data type such as music, video, and photos.
- a user may want all of the backup files restored, but not all the files may be needed immediately for read/write operations.
- Functional utility may be from the viewpoint of the system, in terms of files that are needed by the system (or an application using or executing on the system), or from the viewpoint of the user, in terms of the files that are needed by the user.
- FIG. 2 illustrates an embodiment of this process.
- the files or data are scanned, step 100 .
- the files are prioritized according to the prioritization criteria, as will be described herein.
- the files may be restored (or transmitted, if a replication or other operation is taking place) according to the prioritization, step 104 .
- a variety of algorithms may be used individually or in combination to determine an appropriate recovery order.
- a Most Recently Used (MRU) algorithm may be used. For example, files may be ordered according to their last use date and time, and in this approach, the file that was used last is recovered first. The next to last used file is recovered second and the process continues accordingly until all the files are restored.
- a file's timestamp metadata may be used to determine the most recent use of the file.
- file metadata such as creation timestamp, last access/read timestamp, last metadata change timestamp, last archive timestamp, may be used individually or in combination to best assess importance.
- Timestamp metadata may be kept as an intrinsic part of the data itself, or this information may also be copied and kept as part of another data structure such as a database or XML file for use by the backup/restore application. Usage of a data structure to store timestamp information of files facilitates processing without need to open each file or backup data set to analyze timestamps.
- the timestamp may contain several attributes, such as time and date. Prioritization may be also be done by timestamp ranges, defining a range of times and/or dates, and assigning a priority to each range. For example, several timestamp ranges may be defined, with the first range being timestamps within the last few hours, timestamps within the past day, timestamps within the past week, etc. with higher priority going to the most recent timestamp range.
- files may be ordered according to file type, such as document files (example: Microsoft Word documents or Adobe PDF documents), presentation files (example: Microsoft PowerPoint files), spreadsheet files (example: Microsoft Excel files), database files (example: Microsoft Access files), and so on.
- PowerPoint files may take precedence over text files (.TXT).
- File types may be grouped with the same priority and given higher or lower priority than other groups or individual file types. For example, all Microsoft Office file types can have the same higher priority than text files (.DOC, .XLS, .PPT>.TXT).
- the prioritization and grouping may be determined by the application vendor, the system administrator, the user, etc.
- Groups of file types may be defined according to their association to an application, application suite, task, and so on. Priority may be assigned to a group such that each file type in the group would have the same priority. File type data may be kept as an intrinsic part of the data itself This information may also be copied and kept as part of another data structure such as a database or XML file for use by the backup/restore application.
- the frequency of a file's use or its periodicity may be used to determine the restoration priority of the file. Therefore, higher restoration priority may be given to files having higher frequency of use or whose periodicity coincides with the current or desired timeframe. Frequency of use may be tracked by recording each access to a file, storing this information in metadata associated with the file or in a central data structure.
- Periodicity may be determined by tracking file or data usage, such as by logging.
- the log may be native to the system or application, or an independent logging system may be used to provide a record of file and data usage.
- periodicity may be determined through analysis of backup data sets and archives.
- Timestamp data can be collected from backup data sets and archives and used to create a usage record of the file and data in question.
- a usage interval may be derived, and utilized in predicting or estimating the next time of usage.
- the mean interval may be calculated, or various statistical methods can be used for data smoothing and analysis to predict the next time of usage. Such methods may include time-series modeling, regression analysis, autoregressive models, moving averages, and so on.
- a recovery window may be defined to include a time period prior to the current date, and the window need not be symmetric about the current date.
- ranges may be defined, with a different priority assigned to each. In one embodiment, the range including the current date could receive the highest priority, with other ranges representing future dates receiving lower priorities with increasing distance from the current date.
- a priority or score may be associated with the file and used to establish the file's restore priority.
- This prioritization from predicted usage may be used to determine final prioritization, or combined with other factors such as file type. Weighting the results may offer additional dimensions that could improve the functional utility recovery rate, as timestamp or predicted usage alone may not be sufficient to effectively predict which files will be needed the soonest. For example, some files may be used on an annual basis and their last date of use may be outside a specified recovery time period that has high priority associated with it. In this case, the timestamp alone would suggest that the file not be recovered with high priority. However, by determining the interval of use, it is possible to assign a high priority to the recovery of the file if the due date or anniversary of use is close to the current date.
- a file may have been used recently, which might cause its timestamp score to favor priority recovery.
- This file might also have a predicted usage date that is a year away, which might cause its predicted usage score to favor lower priority. Scoring may be used to reflect priority determinations that have been made. For example, a file falling within the specified time period could have a certain number of points added to its priority score, and if the file's predicted next use is close to the current date or time, more points could be added to its priority score.
- Other variations may include detecting the frequency of file usage during a period near the recovery date. For example, if two files have the same timestamp attribute they are likely to be given the same restoration priority. Because both files cannot come at the same time, one file must come before the other. The frequency of use can be used to further refine the restore priority. In this example, both files have the same timestamp attribute but one file was used every day for the last two weeks whereas the other file changed once since its creation. The file with the frequent and recent file changes can receive a higher weighting than the other file. This permits priority based on multiple relevant factors.
- an application may be executed according to a scheduled interval to log changes in non-real time.
- the timestamp attributes of the files may be read and stored within a database or other data structure.
- the results of the timestamp collection are accumulated and retained within the database resulting in a view of the frequency and intervals of change for each file.
- the selection of the scheduled interval determines the temporal granularity of the resulting log. For example, if an interval of one month is scheduled the resulting log will be able to show which files changed from month to month.
- the resulting log will not be able to discern files which change at greater frequency such as daily, hourly, etc. Greater temporal granularity may be achieved through higher frequency scans up to the point of real-time change logging in which every read and write is logged as it occurs.
- the MRU algorithm may be applied, and the most recently used files may be further ordered by their file type priority and restored in the resulting order.
- Time/date ranges may be used to prioritize the files, which may result in larger groups of files having the same priority, and the resulting list of files may be subsorted by file type, producing a list that is ordered by time/date range and subordered by file type.
- the files may conversely be ordered by file type and subordered by time/date range.
- Prioritization by periodicity may be implemented by using time/date ranges of predicted next use, and the results subsorted by file type or timestamp.
- Other combinations of the disclosed methods may be used, in various orders, and weighting may be used to determine the importance of each characteristic to the restoration priority.
- data may be restored in directed and intentional manner, determined according to the immediacy of value to the user and/or system.
- the determination of restoration priority may be performed by a restore application, by a backup application, by an application that makes use of the data, or by an application that prioritizes the data and passes it (directly or indirectly) to another application, such as the restore application, to perform the restore.
- the restoration/transmission of files or data in order of priority may be made in sequential fashion, or some parallelism may be used (i.e., more than one file may be sent at a time).
- FIG. 3 illustrates a process flow in an embodiment.
- priorities are determined for file types.
- File types may be grouped together, such that all file types in the same group have the same priority. Groups may be defined according to their association with an application, application suite, task, etc.
- timestamp ranges may be defined and priorities assigned to each timestamp range.
- files may be prioritized according to file type. Files may be prioritized according to timestamps, step 116 , and this may be done by sub-sorting the prioritized files from step 114 .
- the prioritization of files may be indicated to the restore application (or replication or other transmission application), step 118 . This may, for example, be done by providing a list of files with priorities indicated, providing an ordered list, or altering a native backup set, as described herein. Files may be restored (or replicated or transmitted) according to the prioritization, step 119 .
- FIG. 4 illustrates a process flow in an embodiment.
- file or data usage information may be obtained from a log, backup data set, or other source of file usage information.
- the data usage information is analyzed to determine the usage interval, step 122 , and various methods may be used such as computing the mean, performing a regression analysis, etc.
- the predicted usage date is derived, step 124 , and using defined time windows with different priorities assigned to each, step 126 , the files are prioritized according to predicted usage in step 128 .
- the prioritization of files is indicated to the transmission (or restore or replication) application, step 130 , and the transmission is performed in step 132 .
- a list of backup files may be created that prioritizes the files for restore.
- This list may contain the file names, paths, and other data elements associated with the file, its location, and its restore-priority so that a restore program may use the information to select and restore the files according to the files' priority settings.
- the list may be kept in priority order.
- priority ordering of the list is not required, and the ordering of file restores may be performed dynamically based on the priority information contained within the list.
- the list can be in any commonly known type or format or in a proprietary format known only to a proprietary application.
- the list may be a text file, an XML file, or a database file.
- the list may be passed to the restore application in a programmatic fashion such as through XML.
- the list could be created in a form that is identical to and compatible with the native data format of the application.
- a restore application is not “priority restore capable” but simply restores files in an arbitrary or non-prioritized manner, it will not be able to accept direction to perform prioritized restores.
- the information within the priority list may be constituted in a form that is compatible with the application's native function. If the restore application uses a comma delimited file to contain its list of pending files to be restored, then the prioritized list of files may be presented in a comma delimited format usable by the restore application. In this manner, the restore application may perform priority restores without internal modification to the application. This process is illustrated in FIG. 5 .
- native backup sets may be reordered to restore files in order of priority.
- Existing backup and restore applications keep their backup data within a data structure (e.g., a file system or a database).
- the restore operation may sequence the data according to the order in which the data are ordered within the data structure itself.
- the application may make use of some form of indexing or list structure to sequence the restore operation of the backup data.
- the restore sequence may be imposed on the restore operation to cause the restore operation to proceed according to a priority order.
- the native order may be re-rendered so that the order matches that of the priority order.
- the data structure may be reordered at the time the restore operation is initiated, at the time of backup, or prior to the initiation of the restore operation but after the backup operation.
- the order of that data structure may be changed to conform to the desired priority order.
- the order of the backup data itself is not required to change in any way. Reordering may be accomplished with a variety of well-known methods.
- the sorting algorithm may be selected based on the desired outcome. In some cases it is desirable to have an initial sort performed on the data set and then a subsort on subsets of the data. In the case where multiple criteria are used in combination to establish the priority, multiple methods of sorting, filtering, and grouping may be used. In these cases, after an initial sort, the data may be additionally sorted and ordered to comply with the prioritization criteria.
- a stable sort algorithm such as bubble sort
- unstable sort algorithms such as quick sort
- timestamp alone were the only sort criteria then an unstable sort algorithm would be acceptable.
- stable sort algorithms may beneficial.
- the data structure may be reordered at the time the restore operation is initiated, at the time of backup, or prior to the initiation of the restore operation but after the backup operation. FIG. 6 illustrates this process.
- Some systems restore backup data that resides within a filesystem structure may be reordered to match the desired priority order.
- a pseudo-filesystem structure may be created that is in priority order.
- the restore application may mount this pseudo-filesystem structure as it would normally mount the backup data filesystem structure.
- the pseudo-filesystem is ordered according to the priority sequence and the backup data remains in its original, native order, thus effectively providing a translation.
- the pseudo-filesystem may contain stubs that are associated to the underlying files/data. The restore system may thus restore the files in priority sequence.
- FIG. 7 illustrates this approach.
- More than one computer may be used, such as by using multiple computers in a parallel or load-sharing arrangement or distributing tasks across multiple computers such that, as a whole, they perform the functions of the components identified herein; i.e. they take the place of a single computer.
- Various functions described above may be performed by a single process or groups of processes, on a single computer or distributed over several computers. Processes may invoke other processes to handle certain tasks.
- a single storage device may be used, or several may be used to take the place of a single storage device.
- the disclosed embodiments are illustrative and not restrictive, and the invention is not to be limited to the details given herein. There are many alternative ways of implementing the invention. It is therefore intended that the disclosure and following claims be interpreted as covering all such alterations and modifications as fall within the true spirit and scope of the invention.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Databases & Information Systems (AREA)
- Data Mining & Analysis (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Description
Claims (19)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/731,931 US8375005B1 (en) | 2007-03-31 | 2007-03-31 | Rapid restore |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/731,931 US8375005B1 (en) | 2007-03-31 | 2007-03-31 | Rapid restore |
Publications (1)
Publication Number | Publication Date |
---|---|
US8375005B1 true US8375005B1 (en) | 2013-02-12 |
Family
ID=47632035
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/731,931 Active 2027-09-17 US8375005B1 (en) | 2007-03-31 | 2007-03-31 | Rapid restore |
Country Status (1)
Country | Link |
---|---|
US (1) | US8375005B1 (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120101996A1 (en) * | 2010-10-21 | 2012-04-26 | Lim Geun-Sik | Apparatus and method for snapshot image segmentation |
US20120136831A1 (en) * | 2010-11-29 | 2012-05-31 | Computer Associates Think, Inc. | System and method for minimizing data recovery window |
US20120137054A1 (en) * | 2010-11-24 | 2012-05-31 | Stec, Inc. | Methods and systems for object level de-duplication for solid state devices |
US20130132350A1 (en) * | 2011-06-03 | 2013-05-23 | Adobe Systems Incorporated | Prioritized digital media archiving |
US8856591B2 (en) | 2011-06-14 | 2014-10-07 | Ca, Inc. | System and method for data disaster recovery |
US9619338B2 (en) | 2013-09-24 | 2017-04-11 | International Business Machines Corporation | File recovery on client server system |
WO2019098486A1 (en) * | 2017-11-20 | 2019-05-23 | Hp Printing Korea Co., Ltd. | Data backup using cloud |
US10432718B2 (en) * | 2016-09-21 | 2019-10-01 | International Business Machines Corporation | Predictive file synchronization |
US20190310920A1 (en) * | 2018-04-04 | 2019-10-10 | International Business Machines Corporation | Pre-Fetching and Staging of Restore Data on Faster Tiered Storage |
US11068196B2 (en) * | 2019-10-24 | 2021-07-20 | EMC IP Holding Company LLC | System and method for a restoration of on-premise backups to a cloud-based service |
US11537478B2 (en) * | 2018-03-16 | 2022-12-27 | EMC IP Holding Company LLC | Automation and optimization of data recovery after a ransomware attack |
Citations (45)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5659614A (en) * | 1994-11-28 | 1997-08-19 | Bailey, Iii; John E. | Method and system for creating and storing a backup copy of file data stored on a computer |
US5966730A (en) | 1996-10-30 | 1999-10-12 | Dantz Development Corporation | Backup system for computer network incorporating opportunistic backup by prioritizing least recently backed up computer or computer storage medium |
US6148372A (en) | 1998-01-21 | 2000-11-14 | Sun Microsystems, Inc. | Apparatus and method for detection and recovery from structural stalls in a multi-level non-blocking cache system |
US6226759B1 (en) | 1998-09-28 | 2001-05-01 | International Business Machines Corporation | Method and apparatus for immediate data backup by duplicating pointers and freezing pointer/data counterparts |
US6496949B1 (en) | 1999-08-06 | 2002-12-17 | International Business Machines Corp. | Emergency backup system, method and program product therefor |
US20030120772A1 (en) | 2001-11-21 | 2003-06-26 | Husain Syed Mohammad Amir | Data fail-over for a multi-computer system |
US20030145226A1 (en) | 2002-01-28 | 2003-07-31 | International Business Machines Corporation | Integrated intrusion detection services |
US20030177324A1 (en) | 2002-03-14 | 2003-09-18 | International Business Machines Corporation | Method, system, and program for maintaining backup copies of files in a backup storage device |
US20030212716A1 (en) | 2002-05-09 | 2003-11-13 | Doug Steele | System and method for analyzing data center enerprise information via backup images |
US20040034672A1 (en) | 2002-05-30 | 2004-02-19 | Takeshi Inagaki | Data backup technique using network |
US20040051988A1 (en) | 2002-09-16 | 2004-03-18 | Jing Gary Gang | Predictive disc drive failure methodology |
US20040073676A1 (en) | 2000-06-29 | 2004-04-15 | Hitachi, Ltd. | Computer system using a storage area network and method of handling data in the computer system |
US20050177767A1 (en) | 2003-12-25 | 2005-08-11 | Hitachi, Ltd. | Backup system and method for tape recording medium |
US20050257085A1 (en) | 2004-05-03 | 2005-11-17 | Nils Haustein | Apparatus, system, and method for resource group backup |
US6999978B2 (en) * | 2001-06-28 | 2006-02-14 | Siemens Aktiengellschaft | Data backup method |
US20060167838A1 (en) | 2005-01-21 | 2006-07-27 | Z-Force Communications, Inc. | File-based hybrid file storage scheme supporting multiple file switches |
US7103740B1 (en) * | 2003-12-31 | 2006-09-05 | Veritas Operating Corporation | Backup mechanism for a multi-class file system |
US20070033340A1 (en) * | 2005-08-08 | 2007-02-08 | International Business Machines Corporation | System and method for providing content based anticipative storage management |
US20070055660A1 (en) * | 2005-09-08 | 2007-03-08 | Deere & Company, A Delaware Corporation | System and method for anticipatory downloading of data |
US20070130599A1 (en) | 2002-07-10 | 2007-06-07 | Monroe David A | Comprehensive multi-media surveillance and response system for aircraft, operations centers, airports and other commercial transports, centers and terminals |
US7231502B2 (en) * | 2004-02-04 | 2007-06-12 | Falcon Stor Software, Inc. | Method and system for storing data |
US20070136541A1 (en) | 2005-12-08 | 2007-06-14 | Herz William S | Data backup services |
US20070168715A1 (en) | 2005-12-08 | 2007-07-19 | Herz William S | Emergency data preservation services |
US7266718B2 (en) * | 2004-02-24 | 2007-09-04 | Hitachi, Ltd. | Computer system for recovering data based on priority of the data |
US20070254697A1 (en) | 2004-09-06 | 2007-11-01 | Matsushita Eleactric Industrial Co., Ltd. | Mobile Terminal Device |
US20070271316A1 (en) | 2006-05-22 | 2007-11-22 | I3Archives, Inc. | System and method for backing up medical records |
US20080028008A1 (en) | 2006-07-31 | 2008-01-31 | Storage Appliance Corporation | Optical disc initiated data backup |
US20080046483A1 (en) * | 2006-08-16 | 2008-02-21 | Lehr Douglas L | Method and system for selecting the timing of data backups based on dynamic factors |
US7346623B2 (en) * | 2001-09-28 | 2008-03-18 | Commvault Systems, Inc. | System and method for generating and managing quick recovery volumes |
US20080072002A1 (en) | 2006-09-20 | 2008-03-20 | Hiroshi Kuwahara | Backup method |
US20080154979A1 (en) * | 2006-12-21 | 2008-06-26 | International Business Machines Corporation | Apparatus, system, and method for creating a backup schedule in a san environment based on a recovery plan |
US7412583B2 (en) | 2003-11-14 | 2008-08-12 | International Business Machines Corporation | Virtual incremental storage method |
US7418464B2 (en) * | 2004-01-27 | 2008-08-26 | International Business Machines Corporation | Method, system, and program for storing data for retrieval and transfer |
US20080270823A1 (en) | 2007-04-27 | 2008-10-30 | International Business Machines Corporation | Fast node failure detection via disk based last gasp mechanism |
US20080282253A1 (en) | 2007-05-10 | 2008-11-13 | Gerrit Huizenga | Method of managing resources within a set of processes |
US7529830B2 (en) * | 2006-05-22 | 2009-05-05 | Hitachi, Ltd. | Storage system and communication control method |
US7529785B1 (en) | 2006-02-28 | 2009-05-05 | Symantec Corporation | Efficient backups using dynamically shared storage pools in peer-to-peer networks |
US7558982B2 (en) * | 2006-09-01 | 2009-07-07 | Siemens Communications, Inc. | Presence enhanced disaster/overload recovery |
US7617255B2 (en) * | 2006-01-25 | 2009-11-10 | Hitachi, Ltd. | Storage system, storage control device and recovery point detection method for storage control device |
US7620843B2 (en) * | 2005-03-02 | 2009-11-17 | International Business Machines Corporation | Rebuilding a storage system |
US7657796B1 (en) * | 2005-09-30 | 2010-02-02 | Symantec Operating Corporation | System and method for distributed storage verification |
US7694092B2 (en) | 2006-09-06 | 2010-04-06 | Hitachi, Ltd. | Storage subsystem and back-up/recovery method |
US7802083B2 (en) * | 2006-12-20 | 2010-09-21 | Intel Corporation | Utilization based installation on a computing system |
US7904428B2 (en) * | 2003-09-23 | 2011-03-08 | Symantec Corporation | Methods and apparatus for recording write requests directed to a data store |
US7937393B2 (en) * | 2005-11-28 | 2011-05-03 | Commvault Systems, Inc. | Systems and methods for classifying and transferring information in a storage network |
-
2007
- 2007-03-31 US US11/731,931 patent/US8375005B1/en active Active
Patent Citations (51)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5659614A (en) * | 1994-11-28 | 1997-08-19 | Bailey, Iii; John E. | Method and system for creating and storing a backup copy of file data stored on a computer |
US5966730A (en) | 1996-10-30 | 1999-10-12 | Dantz Development Corporation | Backup system for computer network incorporating opportunistic backup by prioritizing least recently backed up computer or computer storage medium |
US6148372A (en) | 1998-01-21 | 2000-11-14 | Sun Microsystems, Inc. | Apparatus and method for detection and recovery from structural stalls in a multi-level non-blocking cache system |
US6226759B1 (en) | 1998-09-28 | 2001-05-01 | International Business Machines Corporation | Method and apparatus for immediate data backup by duplicating pointers and freezing pointer/data counterparts |
US6496949B1 (en) | 1999-08-06 | 2002-12-17 | International Business Machines Corp. | Emergency backup system, method and program product therefor |
US20040073676A1 (en) | 2000-06-29 | 2004-04-15 | Hitachi, Ltd. | Computer system using a storage area network and method of handling data in the computer system |
US6999978B2 (en) * | 2001-06-28 | 2006-02-14 | Siemens Aktiengellschaft | Data backup method |
US7346623B2 (en) * | 2001-09-28 | 2008-03-18 | Commvault Systems, Inc. | System and method for generating and managing quick recovery volumes |
US7318095B2 (en) | 2001-11-21 | 2008-01-08 | Clearcube Technology, Inc. | Data fail-over for a multi-computer system |
US20030120772A1 (en) | 2001-11-21 | 2003-06-26 | Husain Syed Mohammad Amir | Data fail-over for a multi-computer system |
US20080034249A1 (en) | 2001-11-21 | 2008-02-07 | Husain Syed M A | Fail-Over In A Multi-Computer System |
US20030145226A1 (en) | 2002-01-28 | 2003-07-31 | International Business Machines Corporation | Integrated intrusion detection services |
US6880051B2 (en) * | 2002-03-14 | 2005-04-12 | International Business Machines Corporation | Method, system, and program for maintaining backup copies of files in a backup storage device |
US20030177324A1 (en) | 2002-03-14 | 2003-09-18 | International Business Machines Corporation | Method, system, and program for maintaining backup copies of files in a backup storage device |
US20030212716A1 (en) | 2002-05-09 | 2003-11-13 | Doug Steele | System and method for analyzing data center enerprise information via backup images |
US20040034672A1 (en) | 2002-05-30 | 2004-02-19 | Takeshi Inagaki | Data backup technique using network |
US20070130599A1 (en) | 2002-07-10 | 2007-06-07 | Monroe David A | Comprehensive multi-media surveillance and response system for aircraft, operations centers, airports and other commercial transports, centers and terminals |
US6982842B2 (en) | 2002-09-16 | 2006-01-03 | Seagate Technology Llc | Predictive disc drive failure methodology |
US20040051988A1 (en) | 2002-09-16 | 2004-03-18 | Jing Gary Gang | Predictive disc drive failure methodology |
US7904428B2 (en) * | 2003-09-23 | 2011-03-08 | Symantec Corporation | Methods and apparatus for recording write requests directed to a data store |
US20080222376A1 (en) | 2003-11-14 | 2008-09-11 | David Alan Burton | Virtual incremental storage apparatus method and system |
US7412583B2 (en) | 2003-11-14 | 2008-08-12 | International Business Machines Corporation | Virtual incremental storage method |
US20050177767A1 (en) | 2003-12-25 | 2005-08-11 | Hitachi, Ltd. | Backup system and method for tape recording medium |
US7073036B2 (en) * | 2003-12-25 | 2006-07-04 | Hitachi, Ltd. | Backup system and method for tape recording medium |
US7103740B1 (en) * | 2003-12-31 | 2006-09-05 | Veritas Operating Corporation | Backup mechanism for a multi-class file system |
US7418464B2 (en) * | 2004-01-27 | 2008-08-26 | International Business Machines Corporation | Method, system, and program for storing data for retrieval and transfer |
US7231502B2 (en) * | 2004-02-04 | 2007-06-12 | Falcon Stor Software, Inc. | Method and system for storing data |
US7266718B2 (en) * | 2004-02-24 | 2007-09-04 | Hitachi, Ltd. | Computer system for recovering data based on priority of the data |
US20050257085A1 (en) | 2004-05-03 | 2005-11-17 | Nils Haustein | Apparatus, system, and method for resource group backup |
US20070254697A1 (en) | 2004-09-06 | 2007-11-01 | Matsushita Eleactric Industrial Co., Ltd. | Mobile Terminal Device |
US20060167838A1 (en) | 2005-01-21 | 2006-07-27 | Z-Force Communications, Inc. | File-based hybrid file storage scheme supporting multiple file switches |
US7620843B2 (en) * | 2005-03-02 | 2009-11-17 | International Business Machines Corporation | Rebuilding a storage system |
US20070033340A1 (en) * | 2005-08-08 | 2007-02-08 | International Business Machines Corporation | System and method for providing content based anticipative storage management |
US20070055660A1 (en) * | 2005-09-08 | 2007-03-08 | Deere & Company, A Delaware Corporation | System and method for anticipatory downloading of data |
US7657796B1 (en) * | 2005-09-30 | 2010-02-02 | Symantec Operating Corporation | System and method for distributed storage verification |
US7937393B2 (en) * | 2005-11-28 | 2011-05-03 | Commvault Systems, Inc. | Systems and methods for classifying and transferring information in a storage network |
US20070168715A1 (en) | 2005-12-08 | 2007-07-19 | Herz William S | Emergency data preservation services |
US20070136541A1 (en) | 2005-12-08 | 2007-06-14 | Herz William S | Data backup services |
US7617255B2 (en) * | 2006-01-25 | 2009-11-10 | Hitachi, Ltd. | Storage system, storage control device and recovery point detection method for storage control device |
US7529785B1 (en) | 2006-02-28 | 2009-05-05 | Symantec Corporation | Efficient backups using dynamically shared storage pools in peer-to-peer networks |
US7529830B2 (en) * | 2006-05-22 | 2009-05-05 | Hitachi, Ltd. | Storage system and communication control method |
US20070271316A1 (en) | 2006-05-22 | 2007-11-22 | I3Archives, Inc. | System and method for backing up medical records |
US20080028008A1 (en) | 2006-07-31 | 2008-01-31 | Storage Appliance Corporation | Optical disc initiated data backup |
US20080046483A1 (en) * | 2006-08-16 | 2008-02-21 | Lehr Douglas L | Method and system for selecting the timing of data backups based on dynamic factors |
US7558982B2 (en) * | 2006-09-01 | 2009-07-07 | Siemens Communications, Inc. | Presence enhanced disaster/overload recovery |
US7694092B2 (en) | 2006-09-06 | 2010-04-06 | Hitachi, Ltd. | Storage subsystem and back-up/recovery method |
US20080072002A1 (en) | 2006-09-20 | 2008-03-20 | Hiroshi Kuwahara | Backup method |
US7802083B2 (en) * | 2006-12-20 | 2010-09-21 | Intel Corporation | Utilization based installation on a computing system |
US20080154979A1 (en) * | 2006-12-21 | 2008-06-26 | International Business Machines Corporation | Apparatus, system, and method for creating a backup schedule in a san environment based on a recovery plan |
US20080270823A1 (en) | 2007-04-27 | 2008-10-30 | International Business Machines Corporation | Fast node failure detection via disk based last gasp mechanism |
US20080282253A1 (en) | 2007-05-10 | 2008-11-13 | Gerrit Huizenga | Method of managing resources within a set of processes |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120101996A1 (en) * | 2010-10-21 | 2012-04-26 | Lim Geun-Sik | Apparatus and method for snapshot image segmentation |
US11640256B2 (en) | 2010-11-24 | 2023-05-02 | Western Digital Technologies, Inc. | Methods and systems for object level de-duplication for data storage system |
US20120137054A1 (en) * | 2010-11-24 | 2012-05-31 | Stec, Inc. | Methods and systems for object level de-duplication for solid state devices |
US11036417B2 (en) * | 2010-11-24 | 2021-06-15 | Western Digital Technologies, Inc. | Methods and systems for object level de-duplication for solid state devices |
US10162553B2 (en) * | 2010-11-24 | 2018-12-25 | Western Digital Technologies, Inc. | Methods and systems for object level de-duplication for solid state devices |
US8548959B2 (en) * | 2010-11-29 | 2013-10-01 | Ca, Inc. | System and method for minimizing data recovery window |
US9311188B2 (en) | 2010-11-29 | 2016-04-12 | Ca, Inc. | Minimizing data recovery window |
US20120136831A1 (en) * | 2010-11-29 | 2012-05-31 | Computer Associates Think, Inc. | System and method for minimizing data recovery window |
US20130132350A1 (en) * | 2011-06-03 | 2013-05-23 | Adobe Systems Incorporated | Prioritized digital media archiving |
US8543550B2 (en) * | 2011-06-03 | 2013-09-24 | Adobe Systems Incorporated | Prioritized digital media archiving |
US9229822B2 (en) | 2011-06-14 | 2016-01-05 | Ca, Inc. | Data disaster recovery |
US8856591B2 (en) | 2011-06-14 | 2014-10-07 | Ca, Inc. | System and method for data disaster recovery |
US9619338B2 (en) | 2013-09-24 | 2017-04-11 | International Business Machines Corporation | File recovery on client server system |
US10432718B2 (en) * | 2016-09-21 | 2019-10-01 | International Business Machines Corporation | Predictive file synchronization |
US11188662B2 (en) * | 2017-11-20 | 2021-11-30 | Hewlett-Packard Development Company, L.P. | Encrypted data backup and restoration for image forming apparatuses using cloud |
WO2019098486A1 (en) * | 2017-11-20 | 2019-05-23 | Hp Printing Korea Co., Ltd. | Data backup using cloud |
US11537478B2 (en) * | 2018-03-16 | 2022-12-27 | EMC IP Holding Company LLC | Automation and optimization of data recovery after a ransomware attack |
US11675672B2 (en) * | 2018-03-16 | 2023-06-13 | EMC IP Holding Company LLC | Automation and optimization of data recovery after a ransomware attack |
US20190310920A1 (en) * | 2018-04-04 | 2019-10-10 | International Business Machines Corporation | Pre-Fetching and Staging of Restore Data on Faster Tiered Storage |
US11068196B2 (en) * | 2019-10-24 | 2021-07-20 | EMC IP Holding Company LLC | System and method for a restoration of on-premise backups to a cloud-based service |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8463798B1 (en) | Prioritized restore | |
US8924352B1 (en) | Automated priority backup and archive | |
US8375005B1 (en) | Rapid restore | |
US11321181B2 (en) | Data protection scheduling, such as providing a flexible backup window in a data protection system | |
US10102079B2 (en) | Triggering discovery points based on change | |
US10331524B2 (en) | Optimizing data backup schedules | |
US10061658B2 (en) | System and method of data intelligent storage | |
US7631151B2 (en) | Systems and methods for classifying and transferring information in a storage network | |
US7822749B2 (en) | Systems and methods for classifying and transferring information in a storage network | |
US8886610B2 (en) | Backup simulation for backing up filesystems to a storage device | |
US8171246B2 (en) | Ranking and prioritizing point in time snapshots | |
US8321644B2 (en) | Backing up filesystems to a storage device | |
US20070027935A1 (en) | Backing up source files in their native file formats to a target storage | |
EP2583183A1 (en) | Data deduplication | |
Tang et al. | Improving Online Restore Performance of Backup Storage via Historical File Access Pattern |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: EMC CORPORATION, MASSACHUSETTS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CLAUDATOS, CHRISTOPHER HERCULES;ANDRUSS, WILLIAM DALE;TERWILLIGER, STEVEN R.;SIGNING DATES FROM 20070419 TO 20070509;REEL/FRAME:019296/0426 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
AS | Assignment |
Owner name: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENT, NORTH CAROLINA Free format text: SECURITY AGREEMENT;ASSIGNORS:ASAP SOFTWARE EXPRESS, INC.;AVENTAIL LLC;CREDANT TECHNOLOGIES, INC.;AND OTHERS;REEL/FRAME:040134/0001 Effective date: 20160907 Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT, TEXAS Free format text: SECURITY AGREEMENT;ASSIGNORS:ASAP SOFTWARE EXPRESS, INC.;AVENTAIL LLC;CREDANT TECHNOLOGIES, INC.;AND OTHERS;REEL/FRAME:040136/0001 Effective date: 20160907 Owner name: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLAT Free format text: SECURITY AGREEMENT;ASSIGNORS:ASAP SOFTWARE EXPRESS, INC.;AVENTAIL LLC;CREDANT TECHNOLOGIES, INC.;AND OTHERS;REEL/FRAME:040134/0001 Effective date: 20160907 Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., A Free format text: SECURITY AGREEMENT;ASSIGNORS:ASAP SOFTWARE EXPRESS, INC.;AVENTAIL LLC;CREDANT TECHNOLOGIES, INC.;AND OTHERS;REEL/FRAME:040136/0001 Effective date: 20160907 |
|
AS | Assignment |
Owner name: EMC IP HOLDING COMPANY LLC, MASSACHUSETTS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:EMC CORPORATION;REEL/FRAME:040203/0001 Effective date: 20160906 |
|
AS | Assignment |
Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., T Free format text: SECURITY AGREEMENT;ASSIGNORS:CREDANT TECHNOLOGIES, INC.;DELL INTERNATIONAL L.L.C.;DELL MARKETING L.P.;AND OTHERS;REEL/FRAME:049452/0223 Effective date: 20190320 Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., TEXAS Free format text: SECURITY AGREEMENT;ASSIGNORS:CREDANT TECHNOLOGIES, INC.;DELL INTERNATIONAL L.L.C.;DELL MARKETING L.P.;AND OTHERS;REEL/FRAME:049452/0223 Effective date: 20190320 |
|
AS | Assignment |
Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., TEXAS Free format text: SECURITY AGREEMENT;ASSIGNORS:CREDANT TECHNOLOGIES INC.;DELL INTERNATIONAL L.L.C.;DELL MARKETING L.P.;AND OTHERS;REEL/FRAME:053546/0001 Effective date: 20200409 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |
|
AS | Assignment |
Owner name: WYSE TECHNOLOGY L.L.C., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: SCALEIO LLC, MASSACHUSETTS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: MOZY, INC., WASHINGTON Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: MAGINATICS LLC, CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: FORCE10 NETWORKS, INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: EMC IP HOLDING COMPANY LLC, TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: EMC CORPORATION, MASSACHUSETTS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: DELL SYSTEMS CORPORATION, TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: DELL SOFTWARE INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: DELL PRODUCTS L.P., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: DELL MARKETING L.P., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: DELL INTERNATIONAL, L.L.C., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: DELL USA L.P., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: CREDANT TECHNOLOGIES, INC., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: AVENTAIL LLC, CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: ASAP SOFTWARE EXPRESS, INC., ILLINOIS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 |
|
AS | Assignment |
Owner name: SCALEIO LLC, MASSACHUSETTS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 Owner name: EMC IP HOLDING COMPANY LLC (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MOZY, INC.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 Owner name: EMC CORPORATION (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MAGINATICS LLC), MASSACHUSETTS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 Owner name: DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO FORCE10 NETWORKS, INC. AND WYSE TECHNOLOGY L.L.C.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 Owner name: DELL PRODUCTS L.P., TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 Owner name: DELL INTERNATIONAL L.L.C., TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 Owner name: DELL USA L.P., TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 Owner name: DELL MARKETING L.P. (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO CREDANT TECHNOLOGIES, INC.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 Owner name: DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO ASAP SOFTWARE EXPRESS, INC.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 |
|
AS | Assignment |
Owner name: SCALEIO LLC, MASSACHUSETTS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 Owner name: EMC IP HOLDING COMPANY LLC (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MOZY, INC.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 Owner name: EMC CORPORATION (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MAGINATICS LLC), MASSACHUSETTS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 Owner name: DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO FORCE10 NETWORKS, INC. AND WYSE TECHNOLOGY L.L.C.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 Owner name: DELL PRODUCTS L.P., TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 Owner name: DELL INTERNATIONAL L.L.C., TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 Owner name: DELL USA L.P., TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 Owner name: DELL MARKETING L.P. (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO CREDANT TECHNOLOGIES, INC.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 Owner name: DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO ASAP SOFTWARE EXPRESS, INC.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 12 |